(A) study on privacy leakage from unwanted side channel in LTE control planeLTE 제어 평면 프로토콜에서의 부채널을 통한 프라이버시 침해 공격 및 대응기술 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 5
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisor김용대-
dc.contributor.authorBae, Sangwook-
dc.contributor.author배상욱-
dc.date.accessioned2024-07-26T19:31:32Z-
dc.date.available2024-07-26T19:31:32Z-
dc.date.issued2022-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=1052016&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/321129-
dc.description학위논문(박사) - 한국과학기술원 : 전기및전자공학부, 2022.8,[vi, 81 p. :]-
dc.description.abstractdownlink channel, uplink channel, and implementation of baseband processors in mobile devices. As a result, although the security mechanisms in LTE are designed to preserve the subscriber’s privacy, we argue that a) unwanted side channels do exist in the cellular network due to the unprotected LTE control plane protocol’s lower layers and diversities in the UE implementation, and b) those side channels can be utilized to the privacy threatening attacks. Especially, this dissertation focuses on discussing side-channel attacks using leaked information in unprotected layers in three different domains with practical considerations. First, we investigate the information leakage in the downlink channel in LTE and show that an unprivileged third party can exploit the information leakages in the downlink channel for identifying a video title that a victim is watching. Second, we conduct a security analysis on the uplink channel in LTE. We show that an adversary who has no access to victims’ devices or cell towers can locate the target victim by using the side channel in the design of the uplink channel. Third, we analyze the differences in the baseband implementation. We then present the UE identification attack which infers the name of the device and conduct a large-scale evaluation to show its practicality in the real world. Lastly, we conduct a case study of utilizing the side channels in LTE for defeating the voice phishing eco-system. In summary, we argue that fundamental design flaw combined with its implementation of cellular networks produces serious privacy implications that cannot be fixed without changing the standards. Thus, this work enlightens and enhances the security of the design and implementation of current and future mobile network generations.-
dc.description.abstractCellular networks have become a dominant means of serving a variety of applications, including, not limited to the call service, but also our professional and private activities. This trend gives rise to the exchanging data through the cellular network, which is private information that people are reluctant to share as it can reveal their political, financial, and personal interests. Accordingly, the design and implementation of the cellular network require high standards for privacy and secrecy. Contrary to this importance, as the cellular network uses an open medium (i.e., air) for the data, it is exposed to a wide range of privacy-threatening attacks. Note that the previous studies have uncovered several privacy-threatening vulnerabilities in the cellular network, spanning from 2G to LTE. However, those vulnerabilities have been still unpatched in the 5G standard design because of the absence of practical privacy-threatening attack scenarios and limited analysis of their practicality and severity.In this dissertation, we conduct a security analysis of the cellular network design and implementation, which may occur when the characteristics of various applications and the cellular network meet. More specifically, we analyze the unwanted side channels in the three domains of LTE networks-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectLTE 제어평면▼a부채널▼a부채널공격▼a프라이버시 침해공격▼a이동통신▼aLTE▼aSIMBOX-
dc.subjectSide channel▼aCellular network▼aLTE▼aSide channel attack▼aPrivacy threatening attack▼aSIMBOX-
dc.title(A) study on privacy leakage from unwanted side channel in LTE control plane-
dc.title.alternativeLTE 제어 평면 프로토콜에서의 부채널을 통한 프라이버시 침해 공격 및 대응기술 연구-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :전기및전자공학부,-
dc.contributor.alternativeauthorKim, Yongdae-
Appears in Collection
EE-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0